When running in Appliance mode, an authenticated remote command injection vulnerability exists in an undisclosed iControl REST endpoint. A successful exploit can allow the attacker to cross a security boundary.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://my.f5.com/manage/s/article/K000138757 |
![]() ![]() |
History
Wed, 05 Feb 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 05 Feb 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | When running in Appliance mode, an authenticated remote command injection vulnerability exists in an undisclosed iControl REST endpoint. A successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | |
Title | BIG-IP iControl REST vulnerability | |
Weaknesses | CWE-77 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: f5
Published:
Updated: 2025-02-06T04:55:24.286Z
Reserved: 2025-01-22T00:16:50.328Z
Link: CVE-2025-23239

Updated: 2025-02-05T18:16:06.471Z

Status : Received
Published: 2025-02-05T18:15:31.373
Modified: 2025-02-05T18:15:31.373
Link: CVE-2025-23239

No data.